We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

The SplinterNet

Here’s what’s happening around the world that threatens the way we use the Internet in the future…

Remember the early Internet days – for the first time things we never thought could be free, were free! We could make calls using Skype, read and research all kinds of how-tos, and email anyone in the world…well, data use and misuse is getting out of hand, and countries around the world are starting to rethink some things…some of it good (like how your data can and should be used), and some bad (like what you should and should not be aloud to read about). As small business owners we depend on this “free utility” for growth and reach – keep your eye on the trends and were lawmakers are headed with this! Read the whole article Here

P.S. Have you seen this free eBook? Download it Here!

Even if your phone isn’t listening to you, it is watching you!

We’ve discovered alarming privacy risks – particularly in the Android world – the researchers we’re following are telling us, over 9000 of the 17,000 apps they recently studied, share image and video data with third parties (without asking you!).  Check this article out here.

P.S. Have you seen this free eBook? Download it here now.

We assume apps are secure – don’t be fooled.

Sex and football – two interests used in a recent Hamas attack…don’t write this off just because it was overseas. They used Android, and managed to get three apps on the app store, resulting in the compromise of hundreds of Israeli soldiers. It could have been me or you…be careful what you download, and consider using malware protection on your phone. Read the article Here.

P.S. Have you seen this free eBook? Download it Here now…

 

These New Cyberattacks Have the Power to Destroy – Are You Ready?

They’re called Gen V (generation 5) attacks…multi-vector, meaning they come in from different places all at once…including your cloud vendors! Mobile phones, wireless, home computers…simple firewalls and passwords don’t stop this sort of thing. However  there are some things you can be doing. Most attacks take some time – so having a detection / response security program in place, much like monitoring the alarm you might use in your home with a service like ADT.  When the hacker starts – detection alerts you, giving you (or your favorite 3rd party security monitoring company) warning to block their attempts. This is the new world we live in…

Read the article Here.

P.S. Have you seen this free eBook?  Download it Here now.

Is the Cloud Secure? What About Your Other Connections?

What about your HVAC, your accountant, your legal advisor, your supplier…or anyone else you’re connected to…

The more your business moves to cloud, or connects with third party suppliers and partners, the more you need to be thinking about security outside your own firewall and workstation. Some good points brought out in this article…Read it Here.

P.S. Have you seen this free eBook?  Download it here now: https://troe.clickfunnels.com/stelzl-ebook

 

Did You Know Your Printer Can Let Hackers In? Something Most Never Think About…

 

This is important – Firewalls and antivirus software are necessary, but there are some holes no one is really thinking about…The printer is one of them. Is your printer letting hackers in?  Read the article here.

P.S. Have you seen this free eBook? Download it now here: https://troe.clickfunnels.com/stelzl-ebook

You Need A Password Manager…

Writing them down isn’t working…

The age of digitalization is here, and that means everything is in the cloud. While some things are suddenly more convenient, another administrative nightmare has been born. Too many passwords! And now the experts are telling you you need lower case, upper case, special characters, and at least 8 characters!!!

The truth is, you really do need something better than your dog’s name followed by a number. It’s computers that try to guess your password, not some guy locked in a dark room. And computers can process permutations of numbers fast!

The solution? Well, the best solution is two factor authentication. However, that may not be available where you work or on all the cloud services you use.  The next best thing is a password manager…or password vault.

Take a minute today and Google “password manager”.  There are lots of great options. Some sync to your phone or across all of your devices. Password managers can store lots of information including driver’s license numbers, social security numbers for your family, and the thousands of passwords you carry in a notebook (or are you one of those who uses the same password for everything – which is a really bad idea).  Download one and start using it. A good one will allow you to easily generate new (complex) passwords in a moment, as well as storing links to the sites you use, and auto-filling them. The best part is, these programs encrypt your data so it’s a whole lot safer than writing them down or reusing them.

P.S. Have you seen this eBook?  Download it now for free here: https://troe.clickfunnels.com/stelzl-ebook

App Traps – Think Before You Download!

This article was published in The Wall Street Journal – which you may not have access to (without a subscription), however the topic is important, and we are keeping an eye on this for you right here! App Traps: How Cheap Smartphones Help Themselves to User Data.

In this report, the author uncovers an interesting trend with burner phones – which may come with preloaded apps – written by who knows who. Lots of people use these for privacy,  travel, etc. However, today’s phones have the ability to listen to you, track you, and watch you! It’s only our trust in the vendor controlling that apps that gives us a sense of security…and when that disappears, there’s no telling what your phone is doing!   

My recommendation? Stick to known carriers, know brands, and make sure you phone security is set up properly – including malware protection (especially on Android).

P.S. Have you seen this eBook?  Download it now for free! https://troe.clickfunnels.com/stelzl-ebook

 

These New Cyber Attacks Have the Power to Destroy You…

Are you ready?

They’re called Gen V (generation 5) attacks…multi-vector, meaning they come in from different places all at once…including your cloud vendors! Mobile phones, wireless, home computers…simple firewalls and passwords don’t stop this sort of thing. However there are some things you can be doing. Most attacks take some time – so having a detection / response security program in place, much like monitoring the alarm you might use in your home with a service like ADT. When the hacker starts – detection alerts you, giving you (or your favorite 3rd party security monitoring company) warning to block their attempts. This is the new world we live in…

Read More About it Here…

P.S. Have you seen this free eBook?  Download it here now: https://troe.clickfunnels.com/stelzl-ebook

The 10 Biggest Computer Hacks – Disasters We Can Learn From

Hacker History we should all know – safeguarding data has a lot to do with learning from those who have been hit in the past and not repeating their mistakes.  Every hack I can think of involves at least one mistake made by company leadership or their end-users (not well educated on safe data handling practices)…

P.S. Have you seen this free eBook? Download it now here: https://troe.clickfunnels.com/stelzl-ebook

The SplinterNet

Here’s what’s happening around the world that threatens the way we use the Internet in the future…

Remember the early Internet days – for the first time things we never thought could be free, were free! We could make calls using Skype, read and research all kinds of how-tos, and email anyone in the world…well, data use and misuse is getting out of hand, and countries around the world are starting to rethink some things…some of it good (like how your data can and should be used), and some bad (like what you should and should not be aloud to read about). As small business owners we depend on this “free utility” for growth and reach – keep your eye on the trends and were lawmakers are headed with this! Read the whole article Here

P.S. Have you seen this free eBook? Download it Here!

Even if your phone isn’t listening to you, it is watching you!

We’ve discovered alarming privacy risks – particularly in the Android world – the researchers we’re following are telling us, over 9000 of the 17,000 apps they recently studied, share image and video data with third parties (without asking you!).  Check this article out here.

P.S. Have you seen this free eBook? Download it here now.

We assume apps are secure – don’t be fooled.

Sex and football – two interests used in a recent Hamas attack…don’t write this off just because it was overseas. They used Android, and managed to get three apps on the app store, resulting in the compromise of hundreds of Israeli soldiers. It could have been me or you…be careful what you download, and consider using malware protection on your phone. Read the article Here.

P.S. Have you seen this free eBook? Download it Here now…

 

These New Cyberattacks Have the Power to Destroy – Are You Ready?

They’re called Gen V (generation 5) attacks…multi-vector, meaning they come in from different places all at once…including your cloud vendors! Mobile phones, wireless, home computers…simple firewalls and passwords don’t stop this sort of thing. However  there are some things you can be doing. Most attacks take some time – so having a detection / response security program in place, much like monitoring the alarm you might use in your home with a service like ADT.  When the hacker starts – detection alerts you, giving you (or your favorite 3rd party security monitoring company) warning to block their attempts. This is the new world we live in…

Read the article Here.

P.S. Have you seen this free eBook?  Download it Here now.

Is the Cloud Secure? What About Your Other Connections?

What about your HVAC, your accountant, your legal advisor, your supplier…or anyone else you’re connected to…

The more your business moves to cloud, or connects with third party suppliers and partners, the more you need to be thinking about security outside your own firewall and workstation. Some good points brought out in this article…Read it Here.

P.S. Have you seen this free eBook?  Download it here now: https://troe.clickfunnels.com/stelzl-ebook

 

Did You Know Your Printer Can Let Hackers In? Something Most Never Think About…

 

This is important – Firewalls and antivirus software are necessary, but there are some holes no one is really thinking about…The printer is one of them. Is your printer letting hackers in?  Read the article here.

P.S. Have you seen this free eBook? Download it now here: https://troe.clickfunnels.com/stelzl-ebook

You Need A Password Manager…

Writing them down isn’t working…

The age of digitalization is here, and that means everything is in the cloud. While some things are suddenly more convenient, another administrative nightmare has been born. Too many passwords! And now the experts are telling you you need lower case, upper case, special characters, and at least 8 characters!!!

The truth is, you really do need something better than your dog’s name followed by a number. It’s computers that try to guess your password, not some guy locked in a dark room. And computers can process permutations of numbers fast!

The solution? Well, the best solution is two factor authentication. However, that may not be available where you work or on all the cloud services you use.  The next best thing is a password manager…or password vault.

Take a minute today and Google “password manager”.  There are lots of great options. Some sync to your phone or across all of your devices. Password managers can store lots of information including driver’s license numbers, social security numbers for your family, and the thousands of passwords you carry in a notebook (or are you one of those who uses the same password for everything – which is a really bad idea).  Download one and start using it. A good one will allow you to easily generate new (complex) passwords in a moment, as well as storing links to the sites you use, and auto-filling them. The best part is, these programs encrypt your data so it’s a whole lot safer than writing them down or reusing them.

P.S. Have you seen this eBook?  Download it now for free here: https://troe.clickfunnels.com/stelzl-ebook

App Traps – Think Before You Download!

This article was published in The Wall Street Journal – which you may not have access to (without a subscription), however the topic is important, and we are keeping an eye on this for you right here! App Traps: How Cheap Smartphones Help Themselves to User Data.

In this report, the author uncovers an interesting trend with burner phones – which may come with preloaded apps – written by who knows who. Lots of people use these for privacy,  travel, etc. However, today’s phones have the ability to listen to you, track you, and watch you! It’s only our trust in the vendor controlling that apps that gives us a sense of security…and when that disappears, there’s no telling what your phone is doing!   

My recommendation? Stick to known carriers, know brands, and make sure you phone security is set up properly – including malware protection (especially on Android).

P.S. Have you seen this eBook?  Download it now for free! https://troe.clickfunnels.com/stelzl-ebook

 

These New Cyber Attacks Have the Power to Destroy You…

Are you ready?

They’re called Gen V (generation 5) attacks…multi-vector, meaning they come in from different places all at once…including your cloud vendors! Mobile phones, wireless, home computers…simple firewalls and passwords don’t stop this sort of thing. However there are some things you can be doing. Most attacks take some time – so having a detection / response security program in place, much like monitoring the alarm you might use in your home with a service like ADT. When the hacker starts – detection alerts you, giving you (or your favorite 3rd party security monitoring company) warning to block their attempts. This is the new world we live in…

Read More About it Here…

P.S. Have you seen this free eBook?  Download it here now: https://troe.clickfunnels.com/stelzl-ebook

The 10 Biggest Computer Hacks – Disasters We Can Learn From

Hacker History we should all know – safeguarding data has a lot to do with learning from those who have been hit in the past and not repeating their mistakes.  Every hack I can think of involves at least one mistake made by company leadership or their end-users (not well educated on safe data handling practices)…

P.S. Have you seen this free eBook? Download it now here: https://troe.clickfunnels.com/stelzl-ebook

Are you ready for your FREE Evaluation of Your security?

Click the button below to get started!

Get Started